The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow model named as PBLW is put forward in this paper. The framewo...
详细信息
The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow model named as PBLW is put forward in this paper. The framework of PBLW is proposed. Based on the time constraint directed graph, the workflow theory model in formalization is described in detail, and the time constraint problems are discussed in order to enhance the time management ability of the workflow model. Furthermore, in order to express the complicated secure access control constraint of the workflow, a conditioned RBAC model based on PKJ technology is presented, according to the traditional RBAC security access control model. Finally, the workflow engine driven algorithms for the workflow instance are given. By the actual inspection and users' feedback, it proves that this model can express the basic requirements of a majority of the process applications.
This paper presents two parallel semantics of constraint logic programs: multiset answer constraint semantics and game semantics, which differ entirely from the traditional semantics. When giving the first semantics, ...
详细信息
This paper presents two parallel semantics of constraint logic programs: multiset answer constraint semantics and game semantics, which differ entirely from the traditional semantics. When giving the first semantics, it adopts the s-semantics approach, whose aim is to find notions of models which really capture the operational semantics. And it defines the program equivalence based on multiset answer constraint. Then it investigates the game semantics and proves that it is consistent with traditional operational semantics. On the basis of these two semantics, programmers can comprehend the programs deeply and develop more sound parallel constraint logic programming systems. Finally, it gives the conclusions and future work.
ETL tools are responsible for the extraction of data from sources, their cleansing and loading into a target data warehouse. However, nowadays, the design and development of ETL processes are performed in an in-house ...
详细信息
ETL tools are responsible for the extraction of data from sources, their cleansing and loading into a target data warehouse. However, nowadays, the design and development of ETL processes are performed in an in-house fashion, and need uniformed methodological foundations. In this paper, we propose a novel conceptual model for the modeling of ETL processes. We employ CommonCubes to represent the cubes in a target data warehouse. CommonCubes release the design of ETL processes from overdependence on the physical schema of the target data warehouse, and enable the designers to pay more efforts to data transforming than data loading when designing ETL processes. Based on the constraint functions on source attributes and the transforming operations on target attributes, we define ETL mappings 1.0 capture the semantics of various relationship cardinalities between source attributes and target attributes, which provide a good basis for the design of ETL processes.
This paper presents a new model to incorporate decision theory into Graphplan framework, which enables our planner to handle uncertainty and make decision to choose the optimal one among a set of hypothesis valid plan...
详细信息
This paper presents a new model to incorporate decision theory into Graphplan framework, which enables our planner to handle uncertainty and make decision to choose the optimal one among a set of hypothesis valid plans. This planer, called UTDP is tested on several experimental domains. And the experimental results show that UTGP is sound and efficient and performs better than the famous probabilistic planner Buridan.
The traditional RBAC model already cannot express the complicated secure access control constraint of the workflow. Based on the traditional RBAC model, a new conditioned RBAC model named as CMWRBSAC is proposed on th...
详细信息
The traditional RBAC model already cannot express the complicated secure access control constraint of the workflow. Based on the traditional RBAC model, a new conditioned RBAC model named as CMWRBSAC is proposed on the basis of multi-weighted roles. A conditioned RBAC strategy is discussed on the basis of dynamic role assignment. A new concept of workflow access authorization is defined on the basis of roles with multi-weights, including the hierarchy weight, the degree weight and the sequence weight. Furthermore, in order to solve the problems of the sequence constraint of cooperative activating task by multi-roles and multi-users, a sort algorithm based on token and a sort algorithm based on weighted roles synthesis are presented respectively. Finally, an example is given to show the work processes of these algorithms. This model can express complicated workflow secure access control constraint.
It is well recognized that sequential pattern mining plays an essential role in many scientific and business domains. In this paper, a new extension of sequential pattern, attributes' sequential pattern, is propos...
详细信息
It is well recognized that sequential pattern mining plays an essential role in many scientific and business domains. In this paper, a new extension of sequential pattern, attributes' sequential pattern, is proposed. An attributes' sequential pattern is a sequence of attributes, whose values commonly occur in ascending order over data set. After each record in data set is transformed into an attributes' sequence according to their ordinal values, attributes' sequential patterns can be mined by means of mining sequential patterns. But our work is different from sequential pattern mining. One use of attributes' sequential patterns is to identify possible errors in data set for data cleaning, in which the values of attributes break the attributes' sequential patterns which most of the data conform to. Experiments verify the high efficiency of the method presented.
This paper presents a Case Based Reasoning (CBR) approach to identifying micro-architecture anti-patterns and replacing them with "good" patterns in order to improve the design of software system. The result...
详细信息
This paper is a survey for smart home research, from definition to current research status. First we give a definition to smart home, and then describe the smart home elements, typical research projects, smart home ne...
详细信息
ISBN:
(纸本)0780384032
This paper is a survey for smart home research, from definition to current research status. First we give a definition to smart home, and then describe the smart home elements, typical research projects, smart home networks research status, smart home appliances and challenges at last.
Both item-associations and user-associations mined from the rating table can be used to make personalized recommendation for the current user in rule-based recommend technique. Mining user-associations is the key for ...
详细信息
ISBN:
(纸本)0780384032
Both item-associations and user-associations mined from the rating table can be used to make personalized recommendation for the current user in rule-based recommend technique. Mining user-associations is the key for the recommendation based on user-associations. We find that the current user not only can be used to constrain the rule form in user-associations mining process, but also can be used to partition the rating table into two parts in order to accelerate user-associations mining. It is first proved that user-associations about the current user mined from the whole rating table are contained in those mined only from the data set that contain the current user's rating. Then, a user-association mining frame based on two-stage count called TSCF is proposed. TSCF frame can be implemented by using existing algorithms for mining association rules. And an algorithm TSCF-CL for mining user-associations is implemented by using the concept lattice. Last the performance comparison with ASARM algorithm shows that TSCF-CL can reach better time capacity.
暂无评论